Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Overview
Explore
Expertise
Ecosystem

Select a tab

What's popular

Palo Alto NGFW Foundations Version 11 Lab

The Palo Alto NGFW Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure.
Foundations Lab
•1464 launches

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

Introduction to XQL: Writing Your First Query

Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024

Palo Alto Networks Next-Generation Firewall (NGFW)

Learn the basics about network security and how next-generation firewalls (NGFW) fits in and establish a baseline knowledge to help aid you through the Next-Generation Firewall learning paths. Throughout this learning path you will learn network security, tools and techniques used to help secure your network, and how the NGFW fits into your security requirements. You will have the opportunity to explore these concepts that will help you walk the NGFW learning path with ease and comfort to aid you on your successful journey of learning NGFW! Now let's get started!
Learning Path

Next-Generation Firewall (NGFW)

This learning series will explore Next-Generation Firewalls (NGFW), which are advanced network security devices that combine traditional firewall capabilities with additional features such as intrusion prevention, application awareness and control, and advanced threat protection. These firewalls go beyond the capabilities of traditional firewalls by providing deeper inspection of network traffic and more granular control over applications and user activities.
Learning Series

What's new

Integrating Dataminr into a Palo Alto Networks–Centric Platform

Dataminr Pulse for Cyber Risk integrates external real-time intelligence into Palo Alto Networks' platform, enabling security teams to act on early warning signals before threats impact internal systems. This approach shifts security from reactive to prevention-based by leveraging AI-analyzed data from over a million public sources to detect risks outside organizational perimeters.
Blog
•Jan 28, 2026

Texas A&M University System Teams Up with WWT for Cyber Range Challenge

Texas A&M University Systems partners with WWT for a Cyber Range Capture the Flag competition, empowering students with hands-on threat-hunting experience. Sponsored by industry leaders, this event highlights Texas A&M's commitment to reinvesting in its students and preparing future cybersecurity professionals.
Blog
•Dec 15, 2025

Partner POV | Prisma Browser Innovations: AI-Powered Security for Enterprise Work

The browser has become a critical enterprise risk frontier, with 95% of organizations facing browser-originated security incidents. Prisma Browser, integrated into SASE 4.0, redefines security by embedding AI-powered web protection, password management, and application visibility directly into the browser, empowering safe, productive, and confident work across all applications.
Partner Contribution
•Dec 9, 2025

CrowdStrike and Zscaler Private Access Integrated Lab

WWT's ATC CrowdStrike and Zscaler Integrated lab exists to showcase the integration between CrowdStrike's Falcon Platform, Zscaler Private Access and Zscaler Client Connector through relevant use cases.
Advanced Configuration Lab
•231 launches

Palo Alto NGFW Incorporating User-ID into Security Rules Lab

This lab is a part of a larger collection of mini challenges designed to provide an environment to gain hands-on experience with the fundamental features of Palo Alto's NGFW solution.
Advanced Configuration Lab
•25 launches

Strategic Planning for Post-Quantum Cryptography with WWT and Palo Alto Networks

Join World Wide Technology and Palo Alto Networks experts for an engaging virtual event focused on preparing your organization for the quantum era. Discover the latest insights on post-quantum cryptography (PQC), learn about the risks of "harvest now, decrypt later" attacks, and understand why being PQC ready is critical for long-term data protection and regulatory compliance. Our experts will discuss industry trends, customer challenges, and practical strategies for building crypto agility, ensuring a smooth transition to new standards. Gain actionable guidance to future-proof your security posture and maintain resilience against evolving threats.
Webinar
•Oct 30, 2025 • 9am

Unlocking the ROI of Enterprise Browsers: Securing the Modern Workforce

In today's digital-first world, enterprises face rising pressure to secure web access without compromising productivity or compliance. Traditional browsers, built for consumers, lack the controls and visibility needed in enterprise environments. Enter the enterprise browser—a purpose-built solution designed to meet the security, compliance and usability demands of modern organizations.
Blog
•Aug 7, 2025

The Journey of a Cortex XSOAR Playbook: Theory and Concepts

Master Cortex XSOAR by shifting your perspective on automation. Dive into the foundational concepts of Incidents, Indicators and Playbooks to design scalable, resilient workflows. Embrace integrations, sub-playbooks and error handling to enhance efficiency. Prepare to transform raw data into actionable insights, setting the stage for advanced automation.
Blog
•Jul 31, 2025

Harnessing Customer Engagement for Net Zero Success in IT

Customer energy use represents one of the largest sources of Scope 3 emissions for IT hardware companies. Shifting focus from supplier to customer engagement, leveraging renewable energy attestations and fostering collaboration can drive the substantial emissions reductions required to achieve Net Zero goals.
Blog
•Jul 7, 2025

How the Prisma Access Browser Trivializes Decryption

Anyone who works with TLS decryption will probably tell you it's hard to do and never truly finished. New support tickets about websites or applications that don't work as expected are constantly coming in, requiring continual tuning of TLS decryption settings. The Prisma Access Browser can significantly reduce the complexity and increase the effectiveness of the overall solution. Let's talk about how it does this.
Blog
•Jun 26, 2025

Partner POV | New Frontier of GenAI Threats: A Comprehensive Guide to Prompt Attacks

Generative AI's integration into businesses is threatened by prompt attacks, which exploit vulnerabilities in AI models. Palo Alto Networks' report offers a taxonomy of these attacks, highlighting risks and solutions. Understanding and mitigating these threats is crucial for secure GenAI deployment, ensuring innovation thrives in a protected environment.
Partner Contribution
•Jun 11, 2025

Introduction to XQL: Building Your First Widget

Widgets transform XQL query results into interactive visualizations, aiding SOC analysts in identifying trends and anomalies. This article demonstrates using widgets to graph failed GlobalProtect logins, helping detect brute-force attacks and misconfigurations, and providing proactive assistance to users.
Blog
•Jun 4, 2025

Palo Alto Cortex XDR

Learn about Palo Alto Cortex XDR, Palo Alto's extended detection and response platform that natively integrates network, endpoint, cloud, and third-party data to stop modern attacks. In this Learning Path, you will explore the architecture on which Cortex XDR runs, as well as look into the deployment of Cortex XDR agents and the creation of profiles and policies. You will also learn about the detection and response capabilities that are provided by Cortex XDR.
Learning Path

Introduction to XQL: Custom Datasets for Threat Hunting

Both Cortex XDR and XSIAM let you go well beyond endpoint telemetry from the XDR Agent by ingesting custom datasets through the Broker VM. Forwarding Proxmox syslogs, you can analyze failed logins and suspicious system activity directly in XQL. This unlocks the ability to correlate hypervisor events with endpoint, network, and identity data—all in one platform. Tracking brute-force attempts against pvedaemon, custom datasets give you visibility into layers that traditional EDR misses.
Blog
•May 20, 2025

How Palo Alto Networks is Revolutionizing Security Operations with XSIAM

Cortex XSIAM revolutionizes cybersecurity by integrating AI, automation, and comprehensive visibility into a unified platform. Experience an autonomous SOC that empowers teams to focus on strategic threat hunting and proactive protection.
Article
•Apr 10, 2025

Prisma Access Browser – Secure Browsing for the Modern Enterprise

Palo Alto Networks' Prisma Access Browser revolutionizes cybersecurity for the modern workforce.
Article
•Apr 10, 2025

From Chaos to Clarity: Effective Attack Surface Management with Cortex Xpanse

Attack Surface Management (ASM) is vital for modern cybersecurity. Cortex Xpanse offers continuous visibility, automated discovery and risk assessment of internet-facing assets. This structured approach, from discovery to advanced automation, helps organizations reduce their attack surface and secure assets effectively.
Blog
•Apr 3, 2025

Delivering Modern ZTNA: How Okta and Palo Alto Networks Work Better Together

Okta and Palo Alto Networks synergize to create a robust Zero Trust Network Access (ZTNA) architecture. By integrating identity management and network security, they enable dynamic, policy-driven access across users, applications and devices for continuous validation and enforcement. Discover how these technologies connect to secure modern work environments.
Blog
•Apr 3, 2025

Securing the AI Landscape with Palo Alto Networks' AI Security Posture Management (AI-SPM)

Generative AI is revolutionizing industries but introduces new security challenges. Palo Alto Networks' AI Security Posture Management (AI-SPM) offers comprehensive protection for visibility, control and governance across AI applications. Secure your AI journey with AI-SPM, preventing data leaks, misconfigurations and compliance violations while fostering innovation.
Blog
•Apr 3, 2025

Contractors and the Prisma Access Browser Solution

How the Prisma Access Browser can safely allow contractors or employees on personal devices access to protected resources
Blog
•Apr 2, 2025

Palo Alto Networks

Palo Alto Networks' cybersecurity solutions include advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security.

314 Followers

At a glance

80Total
41Blogs
15Articles
6Labs
5Case Studies
4Events
4Learning Paths
2Briefings
2Videos
1Workshop
What's related
  • Security
  • Blog
  • AI Security
  • Network Security
  • Palo Alto Next-Generation Firewalls
  • Network Security with Palo Alto Networks
  • Palo Alto Networks Prisma Access
  • Security Operations
  • ATC
  • Cybersecurity Risk & Strategy
  • Palo Alto Networks Security Operations
  • Palo Alto Prisma SASE
  • Cyber Range
  • SASE
  • AI & Data
  • Cloud
  • Cloud Security
  • Networking
  • Palo Alto Cortex XSOAR
  • Software Defined WAN (SD-WAN)

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies